Improved Detection for Web File Uploads

The Improved Detection for Web File Uploads feature enhances the detection of sensitive data being uploaded to cloud storage solutions through supported web browsers. Incidents can be generated and activities that put sensitive data at risk can be audited or blocked.

This option applies only to websites and cloud applications that bypass browser extensions. Only URLs accessed from Google Chrome, Microsoft Edge Chromium, and Mozilla Firefox are analyzed.

By default, this setting is disabled.

To enable the feature, select Enable web file uploads analysis.

By default, the following list of URLs is supported: mail.google.com, drive.google.com, *.dropbox.com, *.amazon.com/clouddrive, *.box.com, *.icloud.com, mail.yahoo.com. To add a URL to the list:

  1. Enter the URL name into the URL field. Wildcards are supported:
    • A question mark (?) to represent a single character, as in the following example: “exa?ple.com”
    • An asterisk (*) to represent zero or more characters, as in the following example: “*.example.com”, where “*.example.com” matches www.example.com, www.mail.example.com, and example.com
  2. Click Add to add a new URL.

To remove URLs from the list:

  1. Mark the desired boxes from the list to select URLs.
  2. Click Remove.

To view incidents related to web file uploads, navigate to Main > Reporting > DLP > Incidents page. The Forensics tab shows when the detected breach was a URL- protected file.